Chap 9 - putting it together Flashcards
what is governance
align or link the organizations’ overall goals and objectives to the lower-level security and asset protection goals and objectives that security professionals help establish, operate and maintain
what are policies
mandatory
are formally prepared, authoritatively issued directions or statements of intent that senior leadership provides to the organization
to be effective as directive, it must be explicitly linked to an enforcement mechanism
what are procedures
mandatory
define the explicit, repeatable activities necessary to accomplish a specific task or set of task
what are guidelines
non-mandatory
act as advisory information and can offer insights drawn from experience and observation
what are standards
mandatory
cover a broad range of issues and ideas (NIST, ISO)
what is the breadth and depth in administrative controls (steps)
- Policies
- standards
- guidelines
- procedures
what is COBIT framework
way to manage and document enterprise IT and IT security functions
what is ITIL
IT service set of best practices
what is a security framework
establish a starting set of security requirements or data protection drivers for the workflow as a whole. the framework also establish the success criteria used to assess the in-use system and its controls for compliance and security assessment purposes
what is a risk framework (ERM)
similar to security control frameworks, the security professional may also make use of dedicated risk management frameworks to optimize the organization’s response to risk
role of forensic investigation tools
the tools of digital forensics are put into action moments after an incident or malfunction has been detected. these tools and processes are used to gather data, some of which may be used as evidence in a more formal investigation
how to maintain integrity of an investigation
- respect ethical walls
- non-disclosure
- evidence handling
- respect rights of individuals and other parties
- communication with outside persons conducted through appropriate channels
what are key steps in digital forensic investigation
- appoint an evidence custodian
- maintain a chain of custody
- use backups
- make copies of all original evidence
maintain the chain of evidence
what are admissible evidence in court
admissibility: evidence that is acceptable to the court may be presented. must be:
- accurate
- comprehensible
- objective
what are the 4 types of investigation
- administrative (internal)
- civil
- regulatory
- criminal
what is a business impact analysis (BIA)
the BIA is the effort to determine the value of each asset belonging to the organization, as well as the potential risk of losing assets, the threat likely to affect the organization
BIA provides the foundation to determine the overall scope and extent of the BCDR plans
3 key control parameters for BCDR
- maximum allowable downtime (MAD) = amount of downtime without causing significant/unacceptable harm to organization
- recovery time objective (RTO) = target time for recovery (less then MAD). BCDR strategy and plans must support achieving the desired RTO
- recovery point objective (RPO) = amount of data the organization can lose before unacceptable harm caused to organization. RPO is usually a storage amount (refer to data loss)
what are the key parameters must establish for response activation
- criteria for initiating the response action
- personnel authorized to initiate BCDR action
- information chain to provide the decision making authority with sufficient data
what are the key participants in response team
- responders
- IT
- security
- legal
- human resources
- finance/accounting
- public relations/communications
- senior management / leadership
why is assessment of loss critical
- criminal prosecution -> determine the damage
- civil actions -> determine the damage
- investors reporting
- informing regulators
how can human factor of risk be limited
candidate screening & hiring process
1. detailed & reliable job description
2. checking candidate references
3. checking employment history
4. performing a background check
5. assessing a financial profile
3 main employment agreements & policies
- employee handbook
- employee contract
- NDA